General

  • Target

    c91b92a91a53ce01c53a32668e56606303500db705176639bea2bca067183c12

  • Size

    1.7MB

  • Sample

    220128-lcm5psadhr

  • MD5

    0239855689bf096b0e08068f45af9c26

  • SHA1

    fc6653fd378b8962d26e66d0865422f5c481b60f

  • SHA256

    c91b92a91a53ce01c53a32668e56606303500db705176639bea2bca067183c12

  • SHA512

    ef464af8a49e8832e61df87c40bed8dcc883525d2956c6ecb589b03263c710f718af3979dcb880fd60696c67a3fd1f04546fa7f7908ce463071c15068d031887

Malware Config

Extracted

Family

hydra

C2

http://louisadickens483.website

Targets

    • Target

      c91b92a91a53ce01c53a32668e56606303500db705176639bea2bca067183c12

    • Size

      1.7MB

    • MD5

      0239855689bf096b0e08068f45af9c26

    • SHA1

      fc6653fd378b8962d26e66d0865422f5c481b60f

    • SHA256

      c91b92a91a53ce01c53a32668e56606303500db705176639bea2bca067183c12

    • SHA512

      ef464af8a49e8832e61df87c40bed8dcc883525d2956c6ecb589b03263c710f718af3979dcb880fd60696c67a3fd1f04546fa7f7908ce463071c15068d031887

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks